When you purchase content for devices protected by ____________________, the content is often locked so that it can only be used on your device.

Fill in the blank(s) with the appropriate word(s).


DRM (digital rights management)

Computer Science & Information Technology

You might also like to view...

Layer styles, or layer _________________________, affect the appearance of the layer by adding depth, shadow, shading, texture, or overlay.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

You can limit the display of data to specific information by using ________

A) filtering B) reporting C) sorting D) charting

Computer Science & Information Technology

Your organization decides to use digital signatures to sign messages. In addition, the messages will be encrypted. Which security tenets are covered by this implementation?

A. confidentiality B. authentication C. nonrepudiation D. integrity E. options a and b only F. options c and d only G. options b, c, and d only H. all of the options

Computer Science & Information Technology

Cells in a worksheet that cannot be edited are:

A. blocked cells B. locked cells C. merged cells

Computer Science & Information Technology